Enterasys-networks Security Router X-PeditionTM Manuale Utente Pagina 323

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 466
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 322
XSR User’s Guide 14-1
14
Configuring the Virtual Private Network
VPN Overview
As it is most commonly defined, a Virtual Private Network (VPN) allows two or more private
networks to be connected over a publicly accessed network. VPNs share some similarities with
Wide Area Networks (WAN), but the key feature of VPNs is their use of the Internet rather than
reliance on expensive, private leased lines. VPNs boast tighter security and encryption features as
a private network, while taking advantage of the economies of scale and remote accessibility of
large public networks.
Internet Security Issues
All communication over the Internet uses the Transmission Control Protocol/Internet Protocol
(TCP/IP) or User Datagram Protocol (UDP). They convey packets from one computer to another
through a variety of intermediate computers and separate networks before they reach their
destination.
TCP/IP’s great flexibility has led to its worldwide acceptance as the basic Internet and intranet
communications protocol. But, the fact that TCP/IP allows traffic to pass through intermediate
computers allows third parties to interfere with communications in the following ways:
Eavesdropping - Information remains intact, but its privacy is compromised. For example,
someone could learn your credit card number, record a sensitive conversation, or intercept
classified data.
Tampering - Information in transit is changed or replaced and then sent on to the recipient. For
example, someone could alter an order for goods or change a person's resume.
Impersonation - Information passes to a person who poses as the intended recipient.
Impersonation can take two forms:
Spoofing - A person can pretend to be someone else. For example, a person can pretend to
have the email address
[email protected], or a computer can identify itself as a site called
www.acme.com when it is not. This type of impersonation is known as spoofing.
Misrepresentation - A person or organization can misrepresent itself. For example, suppose
the site
www.acme.com pretends to be a furniture store when it is really just a site that
takes credit-card payments but never sends any goods.
Normally, users of the many cooperating computers that comprise the Internet or other networks
do not monitor or interfere with network traffic that continuously passes through their machines.
But, sensitive personal and business communications over the Internet require precautions that
address potential threats. Fortunately, a set of well-established techniques and standards
aggregated under Internet Protocol Security (IPSec)/Internet Key Exchange (IKE) and the Public-
Key Infrastructure protocol (PKI) make it relatively easy to take such precautions.
The combined features of the above protocols facilitate the following tasks:
Vedere la pagina 322
1 2 ... 318 319 320 321 322 323 324 325 326 327 328 ... 465 466

Commenti su questo manuale

Nessun commento

Isp-technologies SA118 manuales

Manuales del propietario y guías del usuario para Audio Isp-technologies SA118.
Ofrecemos 1 manuales en pdf Isp-technologies SA118 para descargar gratis por tipos de documentos: Manual de usuario






Más productos y manuales para Audio Isp-technologies

Modelos Tipo de documento
SP118 Manual de usuario   ISP Technologies SP118 User Manual, 7 paginas
HDA 1003 Remote Amplifier Manual de usuario   ISP Technologies HDA 1003 Remote Amplifier User Manual, 6 paginas
Audio Transient Supressor Manual de usuario   ISP Technologies Audio Transient Supressor User Manual, 6 paginas
HDDS Master Control Module Manual de usuario   ISP Technologies HDDS Master Control Module User Manual, 12 paginas
HDDS BRC1 Manual de usuario   ISP Technologies HDDS BRC1 User Manual, 9 paginas
SB 112 Manual de usuario   ISP Technologies SB 112 User Manual, 9 paginas
CS 650 Manual de usuario   ISP Technologies CS 650 User Manual, 13 paginas
SM 652 W/B Manual de usuario   ISP Technologies SM 652 W/B User Manual, 9 paginas
CS 651 Manual de usuario   ISP Technologies CS 651 User Manual, 11 paginas
SM 800 Manual de usuario   ISP Technologies SM 800 User Manual, 8 paginas
SM 2110 Manual de usuario   ISP Technologies SM 2110 User Manual, 9 paginas